Biblio

Export 21393 results:
2002
Hamby, J.. "Civil-military operations: joint doctrine and the Malayan Emergency." Joint Force Quarterly 32 (2002): 54-61.
Ratchev, Valeri, and Velichka Milina. "Civil-Military Relations and the Construction of Consolidated Democracy: The Case of Bulgaria." Connections: The Quarterly Journal 1, no. 2 (2002): 89-99.
Jermalavicius, Tomas. "Civil-Military Relations in the Baltic States Introduction / Editor’s Note." Connections: The Quarterly Journal 1, no. 4 (2002): 1-4.
Hoffmann, Stanley. "Clash of Globalizations." Foreign Affairs 81:4 81, no. 4 (2002).
Classified Information Protection Act. State Gazette 45 (30 April 2002), last amendment State Gazette 53 (28 June 2014), 2002.
Sinnott, Richard. "Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland." European Journal of Political Research 41 (2002): 815.
Koulouri, Christina. Clio in the Balkans: The Politics of History Education. Thessaloniki: CDRSEE, 2002.
Lesser, Ian O.. "Coalition Dynamics in the War against Terrorism." The International Spectator 2 (2002): 43-50.
Frank, Thomas. "Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties." Newsday (2002).
Callahan, Philip D.. The Code of the Warrior, The Kinder, Gentler Military and Marksmanship: Changing a Culture In USAWC Strategy Research Project. Carlisle Barracks, PA: U.S. Army War College, 2002.
Chang, Chin-Chen, Ju Yuan Hsiao, and Jyh-Chiang Yeh. "A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform." The Imaging Science Journal (2002): 133-140.
K., Sentz, and Ferson S. Combination of evidence in Dempster-Shafer Theory In SANDIA Tech. Report, SAND2002-0835., 2002.
Moffat, James. Command and Control in the Information Age – Representing its Impact. London, UK: The Stationery Office, 2002.
Baranovsky, V.G.. "Common European Security and Defence Policy: Horizons of the Russian Perception." Connections: The Quarterly Journal 1, no. 1 (2002): 22-28.
Eggers, Joachim, Robert Bäuml, and Bernd Girod. A Communications Approach to Image Steganography In Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE., 2002.
Radeski, Alex, Shawn Parr, Russell Keith-Magee, and John Wharington. Component-Based Development Extensions to HLA In 2002 Spring Simulation Interoperability Workshop. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Huber, Thomas M.. Compound Warfare: That Fatal Knot. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College Press, 2002.
Silver, Daniel. Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.
Preston, Ethan M., and John Lofton. "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment." Whither Law Review 24, no. 71 (2002): 130.
"Concept for the Development of a Professional Army of the Czech Republic and Mobilization of Armed Forces." Vojenské rozhledy 3 (2002).
Faupin, Alain. "Conclusion." Connections: The Quarterly Journal 1, no. 3 (2002): 77-79.
Hutchinson, Asa. Congressional Testimony before the Senate Judiciary Committee’s Subcom-mittee on Technology, Terrorism and Government Information about Narco-Terror: The World Connection Between Drugs and Terror., 2002.
Mihaylova, Lyudmila, Tine Lefebvre, Ernesto Staffetti, Herman Bruyninckx, and Joris De Schutter. "Contact Transitions Tracking During Force-Controlled Compliant Motion Using an Interacting Multiple Model Estimator." Information & Security: An International Journal 9 (2002): 114-129.
Marsh, David. Content and Language Integrated Learning: The European Dimension—Actions, Trends and Foresight Potential. DG Education & Culture, European Commission, 2002.
CORBA Component Model Tutorial. OMG CCM Implementation Group, 2002.

Pages